Analysis

  • max time kernel
    149s
  • max time network
    137s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-11-2024 07:19

General

  • Target

    be33194c4ee4586c536e9ab8d978021815eafdd36231dd4de1186bd3ec5bc85c.exe

  • Size

    60KB

  • MD5

    8277b65d3e0c37d1c5857776a7d8f2c6

  • SHA1

    0d4ef0603abfaf592a4bfc1385f3a5cb511ceea8

  • SHA256

    be33194c4ee4586c536e9ab8d978021815eafdd36231dd4de1186bd3ec5bc85c

  • SHA512

    9a006ee5d3ca1f534874cff906a6e45c147e4e062c52be40e628942f192cdae96dfff3a6c320cd5ed0338449c922aea197f056356f1b7b63d01515c50092a5fc

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJcbQbf1Oti1JGBQOOiQJhATBHfBo8o3PV15Rn:V7Zf/FAxTWoJJZENTBHfiP3zemtjF

Malware Config

Signatures

  • Renames multiple (4650) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\be33194c4ee4586c536e9ab8d978021815eafdd36231dd4de1186bd3ec5bc85c.exe
    "C:\Users\Admin\AppData\Local\Temp\be33194c4ee4586c536e9ab8d978021815eafdd36231dd4de1186bd3ec5bc85c.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:4784

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-4089630652-1596403869-279772308-1000\desktop.ini.tmp

    Filesize

    60KB

    MD5

    5f8e75a98e5c0fa836c8af8deba2d25e

    SHA1

    4b89ad5a494e4035f915b9b9567507ca2c9b0595

    SHA256

    279c0acdc8596c8bb1a4d961716b809106a901ee5b1da4ade0b2b2c716d75678

    SHA512

    fb88a70af26f7f221773a34e2bbcfc83f95561b257982b27ec81b344a478fce387d55bc9c25ec6dfd0305a2f9128063462025b8247ebbdd7e5838057466066b7

  • C:\Program Files\7-Zip\7-zip.dll.exe

    Filesize

    159KB

    MD5

    4b8bf0516809fc195cd3d2cf96246457

    SHA1

    4b549ed93a6d96dc6a61094c6069195262672078

    SHA256

    652a53a6cb2854733851a2600cc67c59eff93b80b54909596ec308f78733d737

    SHA512

    fd6bc230d0a1caa46f8f6cd250cb8c0fdd4bf9e949f835f51ae09a93241f0a42309ae3f93d4052182e5d4b125a936ce1218b1043306ba0f171ce09504e810587

  • memory/4784-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/4784-648-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB